All Products
Search
Document Center

Cloud Firewall:Best practices to defend against worms from C&C servers

Last Updated:Feb 27, 2026

Cloud Firewall provides layered intrusion prevention system (IPS) defense against worm attack chains. It detects and intercepts a variety of worms and dynamically updates and expands its capabilities based on threat intelligence from the cloud.

Business impact of worm attacks

The following issues may occur due to worm attacks:

  • Service interruption: Worms may carry out malicious operations, such as modifying configurations or terminating services, on compromised servers. This may cause server breakdown or service interruption.

  • Information theft: Worms that aim to steal information compress data on compromised servers and send the compressed data to attackers. This may cause data breaches and resource abuse.

  • Regulatory control: When worms spread over a network, they send a large number of packets. This may trigger regulatory control on IP addresses, which results in service interruption. For example, IP addresses may be blocked.

  • Economic or data loss: Ransomware worms encrypt files on compromised servers for ransom, which can cause economic or data loss.

Common worms

The following table describes common worms that Cloud Firewall defends against.

WormSpread methodImpact
DDGExploits Redis vulnerabilities and launches brute-force attacksUses computing resources on compromised servers to mine cryptocurrency
WannaCryExploits Windows system vulnerabilitiesCompromises servers for ransom
BillGatesExploits application vulnerabilities and launches brute-force attacksBuilds a botnet of compromised servers to launch distributed denial-of-service (DDoS) attacks

Case study: DDG worm

DDG is an active worm that spreads by exploiting Redis vulnerabilities and launching brute-force attacks. Compromised servers are added to a botnet to mine cryptocurrency.

Affected systems

  • Servers that use weak SSH passwords

  • Redis or other database servers for which specific vulnerabilities exist

Business impact

  • Service interruption: DDG mines cryptocurrency on compromised servers, which occupies a large number of computing resources. This may affect service availability or cause service interruption.

  • Regulatory control: When DDG spreads over a network, it sends a large number of packets. This may trigger regulatory control on IP addresses, such as IP blocking, which results in service interruption.

Defense architecture against the DDG attack chain

Cloud Firewall detects and defends against the DDG attack chain in real time. This blocks worms and prevents them from spreading.

The following figure shows the defense architecture against the DDG attack chain.

image

Cloud Firewall provides the following IPS capabilities:

IPS capabilityDescription
WhitelistTrusts the source and destination IP addresses that you specify in the whitelist and does not block the traffic of these IP addresses.
Threat IntelligenceScans your servers for threat intelligence and blocks malicious behavior from C&C servers based on the threat intelligence.
Basic ProtectionDetects malware and intercepts the requests sent to or received from C&C servers or backdoors.
Virtual PatchingProvides virtual patches to defend your services against popular high-risk application vulnerabilities in real time.

Configure IPS to defend against worms

Prerequisites

  • A Cloud Firewall instance that is activated and running

Procedure

  1. Log on to the Cloud Firewall console.

  2. In the left-side navigation pane, choose Prevention Configuration > IPS Configuration.

  3. On the Internet Border tab, select Block-Loose for Threat Engine Mode. image

  4. Click Whitelist and add trusted source IP addresses, destination IP addresses, or address books of both inbound and outbound traffic to a specific whitelist.

  5. Turn on the switches on the Basic Protection, Virtual Patching, and Threat Intelligence tabs. image

For more information about IPS capabilities, see IPS configuration.